SlideShare a Scribd company logo
Public Key Infrastructure and Applications Svetlin Nakov Sofia University “St. Kliment Ohridski” E-mail:  [email_address] Nikolay Nedyalkov Latona Development E-mail:  [email_address]
Agenda PKI Overview Digital Signatures What is it? How does it work? Digital Certificates Public Key Infrastructure PKI Components Policies Internet Security Web Security with SSL Smart Cards Email signing – S/MIME
What’s the problem? Information over the Internet is Free, Available, Unencrypted, and Untrusted. Not desirable for many Applications Electronic Commerce Software Products Financial Services Corporate Data Healthcare Subscriptions Legal Information
Multiple Security Issues Privacy Integrity Authentication Non-repudiation Interception Spoofing Modification Proof of parties involved
Why do PKIs need Trust ? CAs could issue certificates without checking the owner identity.  CAs could deliberately issues false certificates.  Private keys could be disclosed by accident, ... or on purpose.  False certificates could be inserted into your browser.  Portals could contain false URLs.  Knowing a principal’s identity does not mean that the principal can be trusted.
Security Algorithms Public Key Algorithms RSA, DSA, Diffie-Hellman, Elliptic Curve Symmetric Algorithms Triple-DES, DES, CAST, RC2, IDEA Hashing Algorithms SHA-1, MD5, RIPEMD
Symmetric Key Encryption If any one’s key is compromised, all keys need to be replaced Not practical or cost effective for Internet environments INTERNET
Public Key Cryptography Public-Key Cryptography is an encryption scheme that uses   mathematically   related, but   not identical   keys. Each user has a key pair (public key/private key). Information encrypted with the public key can only be decrypted using the private  key. Public Encryption Original Document Encrypted Document Private Decryption Original Document Sender Receiver
What is a Digital Signature ? A Digital Signature is the result of  encrypting  the Hash of the data to be exchanged. A Hash (or Message Digest) is the process of mathematically reducing a data stream down to a fixed length field. The Hash uniquely represents the original data. The probability of producing the same Hash with two sets of different data is <.001%. Signature Process is opposite to Encryption Process Private Key is used to Sign (encrypt) Data Public Key is used to verify (decrypt) Signature
Digital Signature Process Step 1 . Hash (digest) the data using one of the supported Hashing algorithms, e.g., MD2, MD5, or SHA-1.  Step 2 . Encrypt the hashed data using the sender’s private key. Step 3 . Append the signature (and a copy of the sender’s public key)  to the end of the data that was signed. Data Hash Encrypt Hash Digital Signature Digital  Signature Private Step 1. Step 2. Step 3. Public
Signature Verification Process Step 1 . Hash the original data using the same hashing algorithm. Step 2 . Decrypt the digital signature using the sender’s public key. All digital signatures contain a copy of the signer’s public key. Step 3 . Compare the results of the hashing and the decryption. If the values match then the signature is verified. If the values do not match, then the data or signature was probably modified in transit. Data Hash Decrypt Hash Digital  Signature Public Key Step 2. Step 3. Hash Step 1.
The Critical Questions How can the recipient know with   certainty the sender’s public key? (to   validate a digital signature) How can the sender know with certainty the recipient’s public key? (to send an encrypted message)
Digital Certificates Before B accepts a message with A’s Digital Signature, B wants to be sure that the public key belongs to A and not to someone masquerading as A on an open network One way to be sure, is to use a trusted third party to authenticate that the public key belongs to A.  Such a party is known as a  Certification Authority (CA) Once A has provided proof of identity, the Certification Authority creates a message containing A’s name and public key.  This message is known as a  Digital Certificate . Before two parties exchange data using Public Key cryptography, each wants to be sure that the other party is authenticated ~~~~ ~~~~ ~~~~ Digital Signature
Digital Certificates A Digital Certificate is simply an X.509 defined data structure with a Digital Signature. The data represents who owns the certificate, who signed the certificate, and other relevant information CA Authorized When the signature is generated by a Certification Authority (CA), the signature can be viewed as trusted. Since the data is signed, it can not be altered without detection. Extensions can be used to tailor certificates to meet the needs of end applications. Version # Serial # Signature Algorithm Issuer Name Validity Period Subject Name Subject Public Key Issuer Unique ID Subject Unique ID Extensions Digital Signature X.509 Certificate
Certificate Life Cycle Key pair generated Certificate issued Key pair in use Private key compromised Certificate revoked Certificate expires Key pair lifetime exceeded? New key pair generated Re-certify
Certificate Revocation Lists CA periodically publishes a data structure called a certificate revocation list (CRL). Described in X.509 standard. Each revoked certificate is identified in a CRL by its serial number. CRL might be distributed by posting at known Web URL or from CA’s own X.500 directory entry.
PKI Players Registration Authority (RA) to identity proof users Certification Authorities (CA) to issue certificates and CRL’s Repositories (publicly available databases) to hold certificates and CRLs
Certification Authority (CA) Certification Authority Trusted (Third) Party  Enrolls and Validates Subscribers Issues and Manages Certificates Manages Revocation and Renewal of Certificates Establishes Policies & Procedures What’s Important Operational Experience High Assurance Security Architecture Scalability Flexibility Interoperability Outsource vs. Inhouse Trustworthiness Certification Authority = Basis of Trust
Registration Authority (RA) Enrolling, de-enrolling, and approving or rejecting requested changes to the certificate attributes of subscribers. Validating certificate applications. Authorizing requests for key-pair or certificate generation and requests for the recovery of backed-up keys. Accepting and authorizing requests for certificate revocation or suspension. Physically distributing personal tokens to and recovering obsolete tokens from people authorized to hold and use them.
Certificate Policy (CP) is … the basis for trust between unrelated entities not a formal “contract” (but implied) a framework that both informs and constrains a PKI implementation a statement of what a certificate means a set of rules for certificate holders a way of giving advice to Relying Parties
Public Key Security Public Key Technology Best Suited to Solve Business Needs Infrastructure = Certification Authorities Services Public Key Technology Digital Certificates Certification Authorities Security Management Technology Infrastructure PRIVACY AUTHENTICATION INTEGRITY NON-REPUDIATION
Authentication/Access Control Can Public Key Technology be used to perform Authentication and Access Control? Sure Can How? Using Digital Signatures  and Digital Certificates   Digital Signature
SSL Protocol Secure Socket Layer (SSL) is a Network Layer protocol used to secure data on TCP/IP networks. Secure Socket Layer Application and so on ….. HTTP TCP/IP Layer Network Layer FTP NNTP
SSL 2.0 Protocol SSL 2.0 provides encryption between the server and the browser. Browser Connects to Secure Server Cert S {SessKey B  } Cert S {Data} SessKey B   Browser verifies signature on Cert S Browser generates session key (SessKey B ) Browser encrypts SessKey B  using Cert S Server sends copy of Server certificate (Cert S ) to Browser, indicating that SSL 2.0 is enabled Server decrypts SessKey B  using it’s private key Browser and Server use SessKey B  to encrypt all data exchanged over the Internet
SSL 3.0 with Client Authentication Browser Connects to Secure Server Cert S  - SSL 3.0 {SessKey B  } Cert S   + Cert B   {Data} SessKey B   Browser verifies signature on Cert S Browser generates session key (SessKey B ) Browser encrypts SessKey B  using Cert S Browser asks operator to select a Browser certificate (Cert B ) to access server Server sends copy of Server certificate (Cert S ) to Browser, indicating that  SSL 3.0 is enabled with client authentication Server verifies signature on Cert B  (Server can check other information as well) Server decrypts SessKey B  using it’s private key Browser and Server use SessKey B  to encrypt all data exchanged over the Internet
Smart Cards Microprocessor with memory that can generate and store keys and certificates Different form factors and interface mechanisms Cryptographic functions using private key are processed on the card itself
Microprocessor based smart card
Smart Cards and PKI Smart cards are «certificate wallets» Secure storage for: Owner private key Trusted root certificates Smart Cards are  a « PC-in-your-Pocket » Generation of owner’s digital signature Smart cards provide: Mobility Security Transparency Issuer branding, loyalty
Digital ID Asymmetric key-pair public key private key X.509 certificate ISO standard public key credentials
Smart card application example: Digital Signature
Smart card in heterogeneous environments Smart cards need readers and drivers Readers desktop or embedded (keyboard, floppy slot) optional display and keypad PC world ready for installation Mac, Unix & Linux ‘waiting’ for USB Drivers PC/SC standard for Windows PC custom developments
ISO 7816  vs  USB
Certificate Portability: Smart Cards Holding Certificates Pros Tamper-proof device Portable Visible security/theft indicator Upgradeable Branding, Photos,Mag-stripe Biometric cards, readers coming Cons More expensive than a pure software solution infrastructure Standards issues Multi-application issues
Pay-TV, did you know it’s PKI ? Pay-TV systems installed worldwide 22 millions customers pay-per-view electronic purse Internet Managed and secured with a very high proprietary secured PKI solution based on a smartcard
Signed and Encrypted Email – S/MIME S/MIME – Secure Multipurpose Internet Mail Extensions   Prevent email spoofing Helps preventing forged email Helps preventing spam Protect sensitive messages & documents Secure business processes Signed messages S/MIME-based applications
Using PKI Certificates in Outlook (1) Open  Outlook .  Select  Tools  from the main menu then choose  Options  from the drop-down menu.   1
Using PKI Certificates in Outlook (2) Click on the  Security  tab.   2
Using PKI Certificates in Outlook (3) Click the  Settings  button.   3
Using PKI Certificates in Outlook (4) In the  Security Settings Name  field, enter a name for the new Security Setting .  Type  S/MIME  in the  Secure Message Format  field.  Click the  Choose  button next to the Signing Certificate field.    4
Using PKI Certificates in Outlook (5) Click on the certificate issued by  C3 Mail CA .  This is your Email Signing certificate.  Click  OK .   5
Using PKI Certificates in Outlook (6) Choose  SHA1  from the  Hash Algorithm  drop down menu.  Click on the  Choose  button next to the  Encryption Certificate  field.   6
Using PKI Certificates in Outlook (7) Click on the certificate issued by  C3 Mail CA .  This is your Email Encryption certificate.  Click  OK .    7
Using PKI Certificates in Outlook (8) Choose  3DES  from the Encryption Certificate drop down box.  Check all 3 boxes in the Change Security Settings window.  Click  OK .    8
Using PKI Certificates in Outlook (9) Click the  Apply  button then click  OK .   9
Questions?

More Related Content

PDF
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
PPTX
Introduction to Public Key Infrastructure
Theo Gravity
 
PPT
Implementing Public-Key-Infrastructures
Oliver Pfaff
 
PPT
Introduction To PKI Technology
Sylvain Maret
 
PPT
6. cryptography
7wounders
 
PPT
Key management.ppt
Sou Jana
 
PDF
SSH - Secure Shell
Peter R. Egli
 
PPTX
Advanced cryptography and implementation
Akash Jadhav
 
Public key Infrastructure (PKI)
Venkatesh Jambulingam
 
Introduction to Public Key Infrastructure
Theo Gravity
 
Implementing Public-Key-Infrastructures
Oliver Pfaff
 
Introduction To PKI Technology
Sylvain Maret
 
6. cryptography
7wounders
 
Key management.ppt
Sou Jana
 
SSH - Secure Shell
Peter R. Egli
 
Advanced cryptography and implementation
Akash Jadhav
 

What's hot (20)

ODP
Email security
Ahmed EL-KOSAIRY
 
PPT
Digital Certificate
Sumant Diwakar
 
PPTX
Cryptography - 101
n|u - The Open Security Community
 
PDF
Digital signatures
Ishwar Dayal
 
PPTX
Digital certificates
Buddhika Karunanayaka
 
PPTX
Kerberos
Sutanu Paul
 
PDF
Pki and OpenSSL
Tony Fabeen
 
PPTX
Kerberos
RafatSamreen
 
PPT
Digital signature
AJAL A J
 
PPTX
Public key infrastructure
Aditya Nama
 
PPTX
Cryptography
Pratiksha Patil
 
PPT
X.509 Certificates
Sou Jana
 
PPTX
Digital signature
Praseela R
 
PDF
Digital certificates &amp; its importance
svm
 
PPTX
Cryptography
herrberk
 
PDF
Asymmetric Cryptography
UTD Computer Security Group
 
PPTX
Ssh
Raghu nath
 
PDF
What is two factor or multi-factor authentication
Jack Forbes
 
PPT
Network Security and Cryptography
Adam Reagan
 
PPT
Digital Signature
Krithika Nagarajan
 
Email security
Ahmed EL-KOSAIRY
 
Digital Certificate
Sumant Diwakar
 
Digital signatures
Ishwar Dayal
 
Digital certificates
Buddhika Karunanayaka
 
Kerberos
Sutanu Paul
 
Pki and OpenSSL
Tony Fabeen
 
Kerberos
RafatSamreen
 
Digital signature
AJAL A J
 
Public key infrastructure
Aditya Nama
 
Cryptography
Pratiksha Patil
 
X.509 Certificates
Sou Jana
 
Digital signature
Praseela R
 
Digital certificates &amp; its importance
svm
 
Cryptography
herrberk
 
Asymmetric Cryptography
UTD Computer Security Group
 
What is two factor or multi-factor authentication
Jack Forbes
 
Network Security and Cryptography
Adam Reagan
 
Digital Signature
Krithika Nagarajan
 
Ad

Similar to PKI and Applications (20)

PPT
PKI_Applications digital certificate.ppt
ubaidullah75790
 
PPT
Public Key Infrastructure and Application_Applications.ppt
lanhuongvernon
 
PPTX
Digital certificates and information security
Devam Shah
 
PPT
Digital Signature.ppt power ponit presentation
ArunsunaiComputer
 
PPT
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
 
PPTX
Digital signature & PKI Infrastructure
Shubham Sharma
 
PPT
Presentation on digital signatures & digital certificates
Vivaka Nand
 
PPT
NS Unit 3 AAR.ppt
Vishalkumar605125
 
PPT
Digital signatures
Apurv Gourav
 
PPTX
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
JaroslavChmurny
 
PPT
Digital Signature
nayakslideshare
 
DOCX
Unit v
Bathshebaparimala
 
PPT
Pki &amp; Personal Digital Certificates, Securing Sensitive Electronic Commun...
Nicholas Davis
 
PPT
Pki & personal digital certificates, securing sensitive electronic communicat...
Nicholas Davis
 
PDF
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
PPTX
Ppt
Nidhi Bansal
 
PDF
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
JUSTSTYLISH3B2MOHALI
 
PPT
Pki the key to securing sensitive communications
Nicholas Davis
 
PPTX
public key infrastructure
vimal kumar
 
PDF
PKI - The Backbone of Digital Signatures - DrySign by Exela
Drysign By Exela
 
PKI_Applications digital certificate.ppt
ubaidullah75790
 
Public Key Infrastructure and Application_Applications.ppt
lanhuongvernon
 
Digital certificates and information security
Devam Shah
 
Digital Signature.ppt power ponit presentation
ArunsunaiComputer
 
Ch12 Cryptographic Protocols and Public Key Infrastructure
Information Technology
 
Digital signature & PKI Infrastructure
Shubham Sharma
 
Presentation on digital signatures & digital certificates
Vivaka Nand
 
NS Unit 3 AAR.ppt
Vishalkumar605125
 
Digital signatures
Apurv Gourav
 
SSL/TLS Introduction with Practical Examples Including Wireshark Captures
JaroslavChmurny
 
Digital Signature
nayakslideshare
 
Pki &amp; Personal Digital Certificates, Securing Sensitive Electronic Commun...
Nicholas Davis
 
Pki & personal digital certificates, securing sensitive electronic communicat...
Nicholas Davis
 
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
I would appreciate help with these 4 questions. Thank You.1) Expla.pdf
JUSTSTYLISH3B2MOHALI
 
Pki the key to securing sensitive communications
Nicholas Davis
 
public key infrastructure
vimal kumar
 
PKI - The Backbone of Digital Signatures - DrySign by Exela
Drysign By Exela
 
Ad

More from Svetlin Nakov (20)

PPTX
AI and the Future of Devs: Nakov @ Techniverse (Nov 2024)
Svetlin Nakov
 
PPTX
AI за ежедневието - Наков @ Techniverse (Nov 2024)
Svetlin Nakov
 
PPTX
AI инструменти за бизнеса - Наков - Nov 2024
Svetlin Nakov
 
PPTX
AI Adoption in Business - Nakov at Forbes HR Forum - Sept 2024
Svetlin Nakov
 
PPTX
Software Engineers in the AI Era - Sept 2024
Svetlin Nakov
 
PPTX
Най-търсените направления в ИТ сферата за 2024
Svetlin Nakov
 
PPTX
BG-IT-Edu: отворено учебно съдържание за ИТ учители
Svetlin Nakov
 
PPTX
Programming World in 2024
Svetlin Nakov
 
PDF
AI Tools for Business and Startups
Svetlin Nakov
 
PPTX
AI Tools for Scientists - Nakov (Oct 2023)
Svetlin Nakov
 
PPTX
AI Tools for Entrepreneurs
Svetlin Nakov
 
PPTX
Bulgarian Tech Industry - Nakov at Dev.BG All in One Conference 2023
Svetlin Nakov
 
PPTX
AI Tools for Business and Personal Life
Svetlin Nakov
 
PDF
Дипломна работа: учебно съдържание по ООП - Светлин Наков
Svetlin Nakov
 
PPTX
Дипломна работа: учебно съдържание по ООП
Svetlin Nakov
 
PPTX
Свободно ИТ учебно съдържание за учители по програмиране и ИТ
Svetlin Nakov
 
PPTX
AI and the Professions of the Future
Svetlin Nakov
 
PPTX
Programming Languages Trends for 2023
Svetlin Nakov
 
PPTX
IT Professions and How to Become a Developer
Svetlin Nakov
 
PPTX
GitHub Actions (Nakov at RuseConf, Sept 2022)
Svetlin Nakov
 
AI and the Future of Devs: Nakov @ Techniverse (Nov 2024)
Svetlin Nakov
 
AI за ежедневието - Наков @ Techniverse (Nov 2024)
Svetlin Nakov
 
AI инструменти за бизнеса - Наков - Nov 2024
Svetlin Nakov
 
AI Adoption in Business - Nakov at Forbes HR Forum - Sept 2024
Svetlin Nakov
 
Software Engineers in the AI Era - Sept 2024
Svetlin Nakov
 
Най-търсените направления в ИТ сферата за 2024
Svetlin Nakov
 
BG-IT-Edu: отворено учебно съдържание за ИТ учители
Svetlin Nakov
 
Programming World in 2024
Svetlin Nakov
 
AI Tools for Business and Startups
Svetlin Nakov
 
AI Tools for Scientists - Nakov (Oct 2023)
Svetlin Nakov
 
AI Tools for Entrepreneurs
Svetlin Nakov
 
Bulgarian Tech Industry - Nakov at Dev.BG All in One Conference 2023
Svetlin Nakov
 
AI Tools for Business and Personal Life
Svetlin Nakov
 
Дипломна работа: учебно съдържание по ООП - Светлин Наков
Svetlin Nakov
 
Дипломна работа: учебно съдържание по ООП
Svetlin Nakov
 
Свободно ИТ учебно съдържание за учители по програмиране и ИТ
Svetlin Nakov
 
AI and the Professions of the Future
Svetlin Nakov
 
Programming Languages Trends for 2023
Svetlin Nakov
 
IT Professions and How to Become a Developer
Svetlin Nakov
 
GitHub Actions (Nakov at RuseConf, Sept 2022)
Svetlin Nakov
 

Recently uploaded (20)

PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
AI-Cloud-Business-Management-Platforms-The-Key-to-Efficiency-Growth.pdf
Artjoker Software Development Company
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
The Future of Artificial Intelligence (AI)
Mukul
 
Doc9.....................................
SofiaCollazos
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 

PKI and Applications

  • 1. Public Key Infrastructure and Applications Svetlin Nakov Sofia University “St. Kliment Ohridski” E-mail: [email_address] Nikolay Nedyalkov Latona Development E-mail: [email_address]
  • 2. Agenda PKI Overview Digital Signatures What is it? How does it work? Digital Certificates Public Key Infrastructure PKI Components Policies Internet Security Web Security with SSL Smart Cards Email signing – S/MIME
  • 3. What’s the problem? Information over the Internet is Free, Available, Unencrypted, and Untrusted. Not desirable for many Applications Electronic Commerce Software Products Financial Services Corporate Data Healthcare Subscriptions Legal Information
  • 4. Multiple Security Issues Privacy Integrity Authentication Non-repudiation Interception Spoofing Modification Proof of parties involved
  • 5. Why do PKIs need Trust ? CAs could issue certificates without checking the owner identity. CAs could deliberately issues false certificates. Private keys could be disclosed by accident, ... or on purpose. False certificates could be inserted into your browser. Portals could contain false URLs. Knowing a principal’s identity does not mean that the principal can be trusted.
  • 6. Security Algorithms Public Key Algorithms RSA, DSA, Diffie-Hellman, Elliptic Curve Symmetric Algorithms Triple-DES, DES, CAST, RC2, IDEA Hashing Algorithms SHA-1, MD5, RIPEMD
  • 7. Symmetric Key Encryption If any one’s key is compromised, all keys need to be replaced Not practical or cost effective for Internet environments INTERNET
  • 8. Public Key Cryptography Public-Key Cryptography is an encryption scheme that uses mathematically related, but not identical keys. Each user has a key pair (public key/private key). Information encrypted with the public key can only be decrypted using the private key. Public Encryption Original Document Encrypted Document Private Decryption Original Document Sender Receiver
  • 9. What is a Digital Signature ? A Digital Signature is the result of encrypting the Hash of the data to be exchanged. A Hash (or Message Digest) is the process of mathematically reducing a data stream down to a fixed length field. The Hash uniquely represents the original data. The probability of producing the same Hash with two sets of different data is <.001%. Signature Process is opposite to Encryption Process Private Key is used to Sign (encrypt) Data Public Key is used to verify (decrypt) Signature
  • 10. Digital Signature Process Step 1 . Hash (digest) the data using one of the supported Hashing algorithms, e.g., MD2, MD5, or SHA-1. Step 2 . Encrypt the hashed data using the sender’s private key. Step 3 . Append the signature (and a copy of the sender’s public key) to the end of the data that was signed. Data Hash Encrypt Hash Digital Signature Digital Signature Private Step 1. Step 2. Step 3. Public
  • 11. Signature Verification Process Step 1 . Hash the original data using the same hashing algorithm. Step 2 . Decrypt the digital signature using the sender’s public key. All digital signatures contain a copy of the signer’s public key. Step 3 . Compare the results of the hashing and the decryption. If the values match then the signature is verified. If the values do not match, then the data or signature was probably modified in transit. Data Hash Decrypt Hash Digital Signature Public Key Step 2. Step 3. Hash Step 1.
  • 12. The Critical Questions How can the recipient know with certainty the sender’s public key? (to validate a digital signature) How can the sender know with certainty the recipient’s public key? (to send an encrypted message)
  • 13. Digital Certificates Before B accepts a message with A’s Digital Signature, B wants to be sure that the public key belongs to A and not to someone masquerading as A on an open network One way to be sure, is to use a trusted third party to authenticate that the public key belongs to A. Such a party is known as a Certification Authority (CA) Once A has provided proof of identity, the Certification Authority creates a message containing A’s name and public key. This message is known as a Digital Certificate . Before two parties exchange data using Public Key cryptography, each wants to be sure that the other party is authenticated ~~~~ ~~~~ ~~~~ Digital Signature
  • 14. Digital Certificates A Digital Certificate is simply an X.509 defined data structure with a Digital Signature. The data represents who owns the certificate, who signed the certificate, and other relevant information CA Authorized When the signature is generated by a Certification Authority (CA), the signature can be viewed as trusted. Since the data is signed, it can not be altered without detection. Extensions can be used to tailor certificates to meet the needs of end applications. Version # Serial # Signature Algorithm Issuer Name Validity Period Subject Name Subject Public Key Issuer Unique ID Subject Unique ID Extensions Digital Signature X.509 Certificate
  • 15. Certificate Life Cycle Key pair generated Certificate issued Key pair in use Private key compromised Certificate revoked Certificate expires Key pair lifetime exceeded? New key pair generated Re-certify
  • 16. Certificate Revocation Lists CA periodically publishes a data structure called a certificate revocation list (CRL). Described in X.509 standard. Each revoked certificate is identified in a CRL by its serial number. CRL might be distributed by posting at known Web URL or from CA’s own X.500 directory entry.
  • 17. PKI Players Registration Authority (RA) to identity proof users Certification Authorities (CA) to issue certificates and CRL’s Repositories (publicly available databases) to hold certificates and CRLs
  • 18. Certification Authority (CA) Certification Authority Trusted (Third) Party Enrolls and Validates Subscribers Issues and Manages Certificates Manages Revocation and Renewal of Certificates Establishes Policies & Procedures What’s Important Operational Experience High Assurance Security Architecture Scalability Flexibility Interoperability Outsource vs. Inhouse Trustworthiness Certification Authority = Basis of Trust
  • 19. Registration Authority (RA) Enrolling, de-enrolling, and approving or rejecting requested changes to the certificate attributes of subscribers. Validating certificate applications. Authorizing requests for key-pair or certificate generation and requests for the recovery of backed-up keys. Accepting and authorizing requests for certificate revocation or suspension. Physically distributing personal tokens to and recovering obsolete tokens from people authorized to hold and use them.
  • 20. Certificate Policy (CP) is … the basis for trust between unrelated entities not a formal “contract” (but implied) a framework that both informs and constrains a PKI implementation a statement of what a certificate means a set of rules for certificate holders a way of giving advice to Relying Parties
  • 21. Public Key Security Public Key Technology Best Suited to Solve Business Needs Infrastructure = Certification Authorities Services Public Key Technology Digital Certificates Certification Authorities Security Management Technology Infrastructure PRIVACY AUTHENTICATION INTEGRITY NON-REPUDIATION
  • 22. Authentication/Access Control Can Public Key Technology be used to perform Authentication and Access Control? Sure Can How? Using Digital Signatures and Digital Certificates Digital Signature
  • 23. SSL Protocol Secure Socket Layer (SSL) is a Network Layer protocol used to secure data on TCP/IP networks. Secure Socket Layer Application and so on ….. HTTP TCP/IP Layer Network Layer FTP NNTP
  • 24. SSL 2.0 Protocol SSL 2.0 provides encryption between the server and the browser. Browser Connects to Secure Server Cert S {SessKey B } Cert S {Data} SessKey B Browser verifies signature on Cert S Browser generates session key (SessKey B ) Browser encrypts SessKey B using Cert S Server sends copy of Server certificate (Cert S ) to Browser, indicating that SSL 2.0 is enabled Server decrypts SessKey B using it’s private key Browser and Server use SessKey B to encrypt all data exchanged over the Internet
  • 25. SSL 3.0 with Client Authentication Browser Connects to Secure Server Cert S - SSL 3.0 {SessKey B } Cert S + Cert B {Data} SessKey B Browser verifies signature on Cert S Browser generates session key (SessKey B ) Browser encrypts SessKey B using Cert S Browser asks operator to select a Browser certificate (Cert B ) to access server Server sends copy of Server certificate (Cert S ) to Browser, indicating that SSL 3.0 is enabled with client authentication Server verifies signature on Cert B (Server can check other information as well) Server decrypts SessKey B using it’s private key Browser and Server use SessKey B to encrypt all data exchanged over the Internet
  • 26. Smart Cards Microprocessor with memory that can generate and store keys and certificates Different form factors and interface mechanisms Cryptographic functions using private key are processed on the card itself
  • 28. Smart Cards and PKI Smart cards are «certificate wallets» Secure storage for: Owner private key Trusted root certificates Smart Cards are a « PC-in-your-Pocket » Generation of owner’s digital signature Smart cards provide: Mobility Security Transparency Issuer branding, loyalty
  • 29. Digital ID Asymmetric key-pair public key private key X.509 certificate ISO standard public key credentials
  • 30. Smart card application example: Digital Signature
  • 31. Smart card in heterogeneous environments Smart cards need readers and drivers Readers desktop or embedded (keyboard, floppy slot) optional display and keypad PC world ready for installation Mac, Unix & Linux ‘waiting’ for USB Drivers PC/SC standard for Windows PC custom developments
  • 32. ISO 7816 vs USB
  • 33. Certificate Portability: Smart Cards Holding Certificates Pros Tamper-proof device Portable Visible security/theft indicator Upgradeable Branding, Photos,Mag-stripe Biometric cards, readers coming Cons More expensive than a pure software solution infrastructure Standards issues Multi-application issues
  • 34. Pay-TV, did you know it’s PKI ? Pay-TV systems installed worldwide 22 millions customers pay-per-view electronic purse Internet Managed and secured with a very high proprietary secured PKI solution based on a smartcard
  • 35. Signed and Encrypted Email – S/MIME S/MIME – Secure Multipurpose Internet Mail Extensions Prevent email spoofing Helps preventing forged email Helps preventing spam Protect sensitive messages & documents Secure business processes Signed messages S/MIME-based applications
  • 36. Using PKI Certificates in Outlook (1) Open Outlook . Select Tools from the main menu then choose Options from the drop-down menu.   1
  • 37. Using PKI Certificates in Outlook (2) Click on the Security tab.   2
  • 38. Using PKI Certificates in Outlook (3) Click the Settings button.   3
  • 39. Using PKI Certificates in Outlook (4) In the Security Settings Name field, enter a name for the new Security Setting . Type S/MIME in the Secure Message Format field. Click the Choose button next to the Signing Certificate field.   4
  • 40. Using PKI Certificates in Outlook (5) Click on the certificate issued by C3 Mail CA . This is your Email Signing certificate. Click OK .   5
  • 41. Using PKI Certificates in Outlook (6) Choose SHA1 from the Hash Algorithm drop down menu. Click on the Choose button next to the Encryption Certificate field.   6
  • 42. Using PKI Certificates in Outlook (7) Click on the certificate issued by C3 Mail CA . This is your Email Encryption certificate. Click OK .   7
  • 43. Using PKI Certificates in Outlook (8) Choose 3DES from the Encryption Certificate drop down box. Check all 3 boxes in the Change Security Settings window. Click OK .   8
  • 44. Using PKI Certificates in Outlook (9) Click the Apply button then click OK .   9